Quantcast
Channel: Rebecca Harness
Browsing latest articles
Browse All 18 View Live

Image may be NSFW.
Clik here to view.

How to Append Outlook 2010 Safe Senders List via Group Policy Object

I recently wrote an article about using the Exchange Management Shell to quickly add/remove addresses in the Outlook Safe Sender’s list. However, it’s dependent upon Exchange 2007/2010 and while it...

View Article



Image may be NSFW.
Clik here to view.

Event ID 5003 Generated When Starting Exchange 2010 Information Store Service...

I ran across an interesting issue with an Exchange 2010 Mailbox Server (SP1 RU6) recently where the Information Store service would not start on a DAG member after a reboot. Every time I tried, even...

View Article

Image may be NSFW.
Clik here to view.

Why Is An SMTP Address Displayed on the “TO” Line for Some Addressee’s and...

Ever wonder why some addressees in the “TO” line of an Outlook email show the actual email address next to the contact name, and others just show the contact name without an email address? Like this:...

View Article

Image may be NSFW.
Clik here to view.

Buy the Book: “The Exceptional Presenter” by Timothy J. Koegel

“Every time you open your mouth to speak in public, you are a public speaker.” – Koegel It’s easy to forget how often we really present at work. It’s not just those rare occasions where we are asked to...

View Article

Image may be NSFW.
Clik here to view.

How to Explain Virtual Desktop Infrastructure (VDI) to Management,...

I recently had a need to explain what exactly VDI is to a group of executives without getting technical, which is pretty difficult because VDI has a lot of technical complexities. This did a pretty...

View Article


Image may be NSFW.
Clik here to view.

Internet Security @ Home: How to Protect Your Kids Online

Protecting our children is one of the most important things we are charged with as a parent, and for thousands of years parents have used their own experiences growing up in order to know what to...

View Article

Image may be NSFW.
Clik here to view.

Buy The Book: “How to Hire A-Players” by Eric Herrenkohl

Recruiting IT professionals has never been more challenging. The demand for solid performers is increasing while the skill set becomes more difficult for an individual to acquire, leading to a serious...

View Article

Image may be NSFW.
Clik here to view.

Closing Open Doors by Bringing Vulnerabilities to Resolution – Six Essential...

New vulnerabilities are discovered every day, and they are an intruders’ best friend. It’s a bit like a burglar finding the door unlocked and wide open; he’s going to have a really easy day at work and...

View Article


Image may be NSFW.
Clik here to view.

The Fatal Flaw of the Apple Pencil

I’m not an artist. I’m a highly mobile business user. I use my iPad Pro several hours a day, and absolutely love the Apple’s Smart Keyboard that goes along with it. It’s the primary way I interface...

View Article


Image may be NSFW.
Clik here to view.

Solving “Big Problems” in Security by Building a Service Model

Remediating strategic security concerns can be very difficult, particularly in large organizations with diverse and rapidly evolving product lines. While security is critically important for every part...

View Article
Browsing latest articles
Browse All 18 View Live




Latest Images